aboutsummaryrefslogtreecommitdiff
path: root/tests/ubifs_tools-tests/lib
diff options
context:
space:
mode:
authorZhihao Cheng <chengzhihao1@huawei.com>2024-11-11 17:08:22 +0800
committerDavid Oberhollenzer <david.oberhollenzer@sigma-star.at>2024-11-11 10:32:46 +0100
commit075e40c91c1a9ae0ce415699b0278d880c098128 (patch)
treec75e4aa0cebea4e04258168121415f09d9932788 /tests/ubifs_tools-tests/lib
parentfcc70be5f29872c11e3c8be36c9d3b9c0d016080 (diff)
tests: ubifs_tools: fsck_tests: Add corrupt+fsck+fault_inject test
Inject memory/io fault while doing fsck for corrupted UBIFS images. This testcase mainly checks whether fsck.ubifs has problems (eg. UAF, null-ptr-def, etc.) in random error paths. Besides, it provides a similar way to simulate powercut during fsck, and checks whether the fsck.ubifs can fix an UBIFS image after many rounds interrupted by kinds of errors. Signed-off-by: Zhihao Cheng <chengzhihao1@huawei.com> Signed-off-by: David Oberhollenzer <david.oberhollenzer@sigma-star.at>
Diffstat (limited to 'tests/ubifs_tools-tests/lib')
-rwxr-xr-xtests/ubifs_tools-tests/lib/common.sh.in3
1 files changed, 2 insertions, 1 deletions
diff --git a/tests/ubifs_tools-tests/lib/common.sh.in b/tests/ubifs_tools-tests/lib/common.sh.in
index 5a07ebc..a27fe10 100755
--- a/tests/ubifs_tools-tests/lib/common.sh.in
+++ b/tests/ubifs_tools-tests/lib/common.sh.in
@@ -234,12 +234,13 @@ function encryption_gen_key()
function encryption_set_key()
{
mnt=$1
+ ignore_err=$2
# https://github.com/google/fscryptctl
key=$(fscryptctl add_key $mnt < $KEY_FILE)
fscryptctl set_policy $key $mnt
#fscryptctl get_policy $mnt
ret=$?
- if [[ $ret != 0 ]]; then
+ if [[ $ret != 0 && $ignore_err != 1 ]]; then
fatal "set encryption policy failed"
fi
}